Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
H Listings:  Result Page 1

Hackers Open Malware Backdoor in Apache Webservers by  Thawte Inc.

July 17, 2013 - A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver.


Hackers, Hacking, and CEHv8 by  Global Knowledge

January 21, 2014 - This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.


Happy Happy Happy: Improving the Life & Legacy of the Project Management Office by  Innotas

September 21, 2013 - If your Project Management Office can only provide transactional functions such as status reporting, review and project monitoring, it may be time to consider an enterprise cloud-based PPM solution. Access this eBook to find out if your traditional PMO could make you a Sitting Duck. You'll learn important steps for becoming a PMO Commander.


Healthcare Privacy 2011: Top 5 Messaging and Collaboration Risks by  Proofpoint, Inc.

October 13, 2011 - For all healthcare providers, properly secured email and other web 2.0 tools help lower costs while improving service delivery. But failing to protect patient data or meet regulatory requirements could mean large fines and strict penalties. Watch this webcast to uncover the top 5 messaging and collaboration risks.


Heuristic Analysis- Detecting Unknown Viruses by  ESET

February 03, 2010 - The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.


Hidden Lynx - Professional Hackers for Hire by  Symantec Corporation

September 17, 2013 - In this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.


Hidden Lynx – Professional Hackers for Hire by  Symantec Corporation

February 17, 2014 - This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.


High Availability Solutions in Exchange Server 2007 That Eliminate the Need for Disaster Recovery by  Marathon Technologies

February 15, 2010 - In this transcript featuring Exchange expert Peter Bruzzese, learn how to utilize tools for high availability (HA) that can eliminate the need for disaster recovery in Exchange Server 2007 environments. Find out how to ensure optimal uptime, availability and recovery in your Exchange environment.


High-performance protection at the network edge—what, why and how by  Sophos, Inc.

November 05, 2009 - With more demands being put on lightweight network-edge hardware to provide security and connectivity, combining simplified malware detection with URI filtering can offer excellent proactive protection without overburdening the hardware or the administrator.


Hit Malware Hard: Your Weapon: CounterSpy Enterprise by  Sunbelt Software

September 01, 2007 - Learn how to protect your organization against today's increasingly complex malware threats. This white paper overviews a software solution that provides malware detection, remediation, and real-time protection for today's evolving ...


Hitachi Converged Platform for Microsoft® Exchange 2010 by  Hitachi Data Systems

November 13, 2013 - This informative paper explores a converged platform for Microsoft Exchange 2010 that's engineered for rapid deployment and tightly integrated with powerful new features in Microsoft Exchange 2010 for resilience, predictable performance and seamless scalability. Read on now to learn more.


Hitachi NAS Platform 3080 and 3090 Storage Consolidation and Intelligent Tiering for Microsoft Exchange Environments by  Hitachi Data Systems

September 01, 2009 - Exchange Unified Messaging brings different mission critical systems together, effectively consolidating infrastructure while improving productivity for users, but at the cost of increasing the load on the Exchange environment in terms of management, storage and importance to the business.


HKMP Case Study: BlackBerry Solution is on the Money for Accounting Firm by  BlackBerry

September 16, 2011 - Access this case study to learn how an accounting firm used BlackBerry® smartphones to meet their needs for almost immediate communications, collaboration, document access and security.


Home Suite Home by  Avaya

September 01, 2011 - This videocast exemplifies a unified communications system that enables companies to experience real-time business communications solutions that allow them to collaborate in any mode they want—voice, video, email, or IM—on virtually any device they want.


Hosted Security IT Manager's Guide by  Symantec Hosted Services

July 01, 2009 - Hosted security, such as MessageLabs, provides companies with protection against email and web malware plus spam and content filtering, email archive and continuity. Read this guide to learn more about your hosted security options.


Hot Knives Through Butter: Evading File-based Sandboxes by  FireEye

March 04, 2014 - This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick.


How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware by  Infoblox

April 24, 2013 - Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.


How can Cisco cloud security accelerate cloud adoption? by  Cisco Systems, Inc.

October 17, 2012 - Cloud computing is quickly becoming a popular solution for customers. Consult this study to learn more about why security is one of the top barriers in regards to cloud computing. Uncover some of the risks and concerns you can face by implementing cloud computing in your enterprise.


How Cisco IT Deployed Enterprise Messaging on Cisco UCS by  Insight

April 24, 2013 - Access this case study to examine how one organization leveraged consolidation in their Exchange environment to optimally support the latest Exchange upgrade. Learn more about the results realized, lessons learned and next steps towards effective Exchange operations.


How Do You Score? Silverpop's Benchmark Study of B2B Lead Management Practices by  Vtrenz, Inc

August 01, 2008 - Listen to this webinar and learn how to grab a peek at your competitors marketing results. It also discusses lead growth, form completion rate, email performance metrics, channels, and best practices.


How Fax and Email Orders are Holding Your Business Back by  Esker Inc.

August 28, 2013 - To avoidissues caused by fax and email sales orders, many savvy companies are turning to automation technologies for help. In this resource, discover how an automated order processing platform works, and discover the benefits you could experience from paperless order processing.


How Malware Can Sneak Into Your Company Networks and How to Deal With It by  AVG Technologies USA, Inc.

March 31, 2010 - Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.


How Mobile Devices are Driving Innovations in Contact Centers by  Avaya

October 29, 2012 - Failing to adopt a customer service strategy for mobile devices could put your business at a serious disadvantage. Gartner research suggests that 80% of companies will suffer revenue loss from the lack of customer support on mobile devices by 2013. Read this paper to learn how to utilize the opportunities mobility offers customer service.


How Social Business Pays Off by  Jive Software

December 31, 2013 - Social collaboration technology is a hot topic in the business applications space today -- but what about the hard numbers? Many companies are wary and want concrete proof of ROI and payback. Fortunately, this informative resource offers just that.


How social media drives business success by

May 21, 2012 - There is a growing recognition that rather than being a distraction or a time drain, social tools could hold the key to a more productive way of doing business, this report from Google argues.


How to Achieve 100% Electronic AR Invoicing Realistic Steps to Quit Paper by  Esker Inc.

November 24, 2009 - This paper illustrates that solutions exist today with a proven track record of success in helping companies make the transition to 100% electronic AR invoicing while satisfying their customers' needs.


How to Achieve Device Control Peace of Mind by  Lumension

July 31, 2013 - Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.


How to Address Your Top Tech Problems by  AT&T Corp

August 04, 2010 - For companies without full-time IT staff, affordable tech support is especially important. Subscription services like AT&T Tech Support 360SM can be a great solution for wireless network configuration, e-mail, office application and computer performance problems, mobile device setup, virus removal and other troublesome support issues.


How to Avoid Targeted Web and Email Attacks by  M86 Security

July 19, 2011 - This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack.


How to be influential online by

November 30, 2012 - Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.


How to Build a Massively Scalable Next-Generation Firewall by  Dell Software

August 23, 2013 - Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.


How to develop cloud applications based on Web app security lessons by  Hewlett-Packard Company

April 25, 2013 - Read this expert guide to get a walk-through on developing secure applications for the cloud, and what controls need to put in place once cloud-based applications are deployed. Find out more about secure development platforms, input filtering, authentication and more.


How to Migrate from Microsoft Exchange 2000/2003 to Exchange Server by  Sun Microsystems, Inc. and Microsoft

September 07, 2007 - Making the move from Microsoft Exchange 2000/2003 Server to Microsoft Exchange Server 2007 is a relatively straight process. <p/> This guide documents the process for a typical migration to Microsoft Exchange Server 2007 along with a few critical considerations before the deployment takes place.


How to Prepare Your Network for the Cloud: Challenges, Strategies and Tools by  Cisco Systems, Inc.

July 11, 2012 - This white paper demonstrates how, with the help of a cloud inteligent network, organizations can deliver a secure, scalable, high-quality user experience for applications and services that operate in the cloud. Within, discover how you can optimize application performance, enhance security and simplify network management.


How to prevent phishing attacks: User awareness and training by  M86 Security

October 26, 2011 - This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.


How to Properly Secure Your Organization: Evolving Your Threat-Detection Techniques and Endpoint Security Strategy by  Bit9, Inc.

October 23, 2013 - Learn the steps of evolving your endpoint security strategy as well as the benefits and challenges that can arise when utilizing threat detection products.


How to Steal 60 Million Dollars in 60 Seconds by  Hewlett-Packard Limited

December 16, 2013 - This webcast outlines key tactics used by cybercriminals to subvert your system and steal your hard-earned money.


How to tackle internet filtering and reporting by

November 10, 2010 - In an environment where access to a secure computing device is governed and controlled by inherently secure protocols, the problem still remains of how access to untrusted environments such as the Web is controlled.


How to use Email, SMS, MMS, and PIN Messaging by  BlackBerry

June 11, 2010 - This video, presented by Tariq Tahir, covers how to integrate BlackBerry Java applications with various BlackBerry messaging systems. Topics include email application, PIN messaing, SMS messaging, MMS messaging, and more.


How Top Retailers Use Transactional Email: Silverpop Study Reveals Revenue-Boosting Tactics by  Silverpop Systems Inc.

January 01, 2006 - Transactional emails are those which companies send to customers to confirm a purchase, notify shipping dates, deliver warranty information and it also provide marketers a rich opportunity to develop strong customer relationships.


How traditional firewalls fail by  Dell Software

December 20, 2012 - Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.


HP E5000 Messaging System for Microsoft Exchange Server 2010 by  HP and Microsoft

April 25, 2011 - Email, voicemail, instant messaging, social networking, messages, faxes, shared calendars, and centralized contacts are all essential for boosting productivity and collaboration. Email has evolved from more than just text. Many would find the situation daunting, but smart organizations know the solution. Read this white paper to learn more.


HP Reference Configuration for Microsoft Exchange 2013 on HP Converged System 700x by  HP and Intel

December 31, 2013 - Explore this highly informative resource to discover how you can benefit from the combination of Microsoft Exchange and HP ConvergedSystem 700x, as well as recommendations from the experts regarding deployment and architecture.


Hyper-Mobility meets Security in the corporate environment by  Kaspersky Lab

November 04, 2011 - The use of mobile devices in the enterprise is on the rise as it enables employees to be more productive. But this new trend does not come without risk. View this paper now to explore the key threats of mobile device usage and discover how to ensure complete protection with Kaspersky Endpoint Security for Smartphone.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts